Traducciones al Español
Estamos traduciendo nuestros guías y tutoriales al Español. Es posible que usted esté viendo una traducción generada automáticamente. Estamos trabajando con traductores profesionales para verificar las traducciones de nuestro sitio web. Este proyecto es un trabajo en curso.
Create a Linode account to try this guide with a $ credit.
This credit will be applied to any valid services used during your first  days.

Access control in Apache determines which clients can access specific resources on your server. Apache 2.4 introduced a new authorization model based on the Require directive, replacing the deprecated Order, Allow, and Deny directives used in earlier versions.

This guide demonstrates how to configure access control using modern Apache 2.4 directives.

Access control is a fundamental part of securing web applications. By restricting access at the web server level, you can prevent unauthorized users from reaching sensitive resources before application logic is ever executed. Common use cases include limiting access to administrative interfaces, internal tools, staging environments, or API endpoints.

Before you begin

  1. Install Apache HTTP Server 2.4 or later on your system:

    sudo apt update
    sudo apt install apache2 -y
  2. Ensure you have root or sudo privileges to edit configuration files.

  3. Be familiar with editing configuration files and restarting services.

Understanding access control in Apache 2.4

Apache 2.4 uses a rule-based authorization system built around the Require directive. This replaces the older Order, Allow, and Deny directives used in Apache 2.2.

In Apache 2.4, authorization is explicit and rule-based. Instead of relying on evaluation order, each Require directive defines a condition that must be met. These conditions can be combined to create precise access policies without relying on implicit behavior.

Access control rules are typically applied in <Directory> and <Location> blocks, within virtual host configuration files, or through .htaccess files.

Most access control functionality is provided by the mod_authz_core and mod_authz_host modules. These modules are enabled by default in most Apache installations.

Basic access control rules

These directives are typically used to establish a default policy. For example, you might deny all access by default and then selectively allow specific clients.

Use the Require directive to allow or deny all requests.

File: /etc/apache2/sites-available/000-default.conf
1
Require all granted
File: /etc/apache2/sites-available/000-default.conf
1
Require all denied

These rules are often used as a baseline before applying more specific restrictions.

Restricting access by IP address

IP-based restrictions are the most common form of access control. They are fast, reliable, and do not depend on DNS resolution.

Use Require ip to allow specific IP addresses or subnets.

Allow a single IP:

File: /etc/apache2/sites-available/000-default.conf
1
Require ip 192.168.1.10

Allow a subnet:

File: /etc/apache2/sites-available/000-default.conf
1
Require ip 192.168.1.0/24

Allow multiple networks:

File: /etc/apache2/sites-available/000-default.conf
1
2
Require ip 192.168.1.0/24
Require ip 10.0.0.0/8

Restricting access by hostname

Hostname-based rules can be useful in environments where clients are identified by domain rather than fixed IP addresses.

Use Require host to match client hostnames:

File: /etc/apache2/sites-available/000-default.conf
1
Require host example.com

Hostname-based rules rely on reverse DNS lookups and can introduce latency or inconsistencies. Prefer IP-based rules when possible.

Combining access rules

Combine rules using containers to express logical relationships between conditions. For example, requiring multiple conditions to be true, or allowing access if any one condition is satisfied.

RequireAll

The RequireAll container allows access only if all of the enclosed conditions are met. This is useful for enforcing multiple requirements at the same time.

File: /etc/apache2/sites-available/000-default.conf
1
2
3
4
<RequireAll>
    Require ip 192.168.1.0/24
    Require not ip 192.168.1.50
</RequireAll>

RequireAny

The RequireAny container allows access if any of the enclosed conditions are met. This is useful when multiple independent conditions should grant access.

File: /etc/apache2/sites-available/000-default.conf
1
2
3
4
<RequireAny>
    Require ip 192.168.1.0/24
    Require ip 10.0.0.0/8
</RequireAny>

RequireNone

The RequireNone container denies access if any of the enclosed conditions are met. This is useful for explicitly blocking specific clients or networks.

File: /etc/apache2/sites-available/000-default.conf
1
2
3
<RequireNone>
    Require ip 203.0.113.10
</RequireNone>

Applying access control rules

The following example demonstrates how to apply an access control rule to a specific directory and verify the result.

  1. Edit your Apache virtual host configuration file:

    sudo nano /etc/apache2/sites-available/000-default.conf
    RHEL-based systems
    On RHEL-based systems, edit /etc/httpd/conf/httpd.conf or a file in /etc/httpd/conf.d/.

    Add a rule to restrict access to a directory:

    File: /etc/apache2/sites-available/000-default.conf
    1
    2
    3
    
    <Directory /var/www/html/private>
        Require ip 192.168.1.0/24
    </Directory>

    When done, press CTRL+X, followed by Y then Enter to save the file and exit nano.

  2. Test the Apache configuration:

    sudo apachectl configtest
    Syntax OK
  3. Restart Apache to apply changes:

    sudo systemctl restart apache2
  4. From an allowed IP address, run:

    curl -I http://your-server-ip/private
    HTTP/1.1 200 OK
  5. From a blocked IP address, run:

    curl -I http://your-server-ip/private
    HTTP/1.1 403 Forbidden

Using .htaccess

You can apply rules in a .htaccess file when you cannot modify the main configuration:

File: /var/www/html/.htaccess
1
Require all denied

.htaccess files introduce performance overhead and should only be used when necessary.

Migrating from Apache 2.2

Apache 2.2 used a different access control model based on Order, Allow, and Deny.

Because the underlying authorization model changed significantly, older configurations may not behave as expected when copied directly into Apache 2.4 without modification.

Apache 2.2 DirectiveApache 2.4 Equivalent
Allow from allRequire all granted
Deny from allRequire all denied
Allow from 192.168.1.0/24Require ip 192.168.1.0/24
Deny from 192.168.1.10Require not ip 192.168.1.10

Example conversion:

File: /etc/apache2/sites-available/000-default.conf
1
2
3
4
# Apache 2.2
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
File: /etc/apache2/sites-available/000-default.conf
1
2
# Apache 2.4
Require ip 192.168.1.0/24

Apache 2.4 includes the mod_access_compat module for backward compatibility. Avoid using it in new configurations.

Common access control patterns

The following examples demonstrate common real-world use cases for access control in Apache.

Restrict an admin directory:

File: /etc/apache2/sites-available/000-default.conf
1
2
3
<Directory /var/www/html/admin>
    Require ip 192.168.1.0/24
</Directory>

Block a specific IP:

File: /etc/apache2/sites-available/000-default.conf
1
2
3
4
<RequireAll>
    Require all granted
    Require not ip 203.0.113.10
</RequireAll>

Allow multiple trusted networks:

File: /etc/apache2/sites-available/000-default.conf
1
2
3
4
<RequireAny>
    Require ip 192.168.1.0/24
    Require ip 10.0.0.0/8
</RequireAny>

More Information

You may wish to consult the following resources for additional information on this topic. While these are provided in the hope that they will be useful, please note that we cannot vouch for the accuracy or timeliness of externally hosted materials.

This page was originally published on


Your Feedback Is Important

Let us know if this guide was helpful to you.


Join the conversation.
Read other comments or post your own below. Comments must be respectful, constructive, and relevant to the topic of the guide. Do not post external links or advertisements. Before posting, consider if your comment would be better addressed by contacting our Support team or asking on our Community Site.
The Disqus commenting system for Linode Docs requires the acceptance of Functional Cookies, which allow us to analyze site usage so we can measure and improve performance. To view and create comments for this article, please update your Cookie Preferences on this website and refresh this web page. Please note: You must have JavaScript enabled in your browser.